Resources

Resource

The report reveals key security trends driven by malicious and negligent insiders that include a cross section of employees, contractors and partners with access to company endpoints, data and applications. Among the most alarming discoveries was that 95 percent of assessments revealed employees wer...

On March 18, 2016, the SANS Industrial Control Systems team and the Electricity Information Sharing and Analysis Center (E-ISAC) jointly published “Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case.” The report provides a consolidated list of the technical components use...

Manufacturing companies have troves of sensitive, valuable information. Security professionals responsible for protecting this data realize that they cannot afford to take risks – and that even the best security tools leave gaps that only endpoint visibility can fill.

Ponemon Institute is pleased to present the findings of the 2016 Cost of Insider Threats study sponsored by Dtex. The purpose of this benchmark study is to understand the direct and indirect costs that result from insider threats.

Whitepaper

Insider threat is increasingly taking center stage with security teams, and for good reason. Despite heavy investments in perimeter security, breaches are still on the rise. As workforces become more dynamic and distributed, security teams are actually finding their existing visibility and controls ...

Insider threats can come from just about any angle. To stop them, the right solution needs to take an intelligent, user-centric approach. Dtex combines unique endpoint visibility with actionable analytics to find, target, and identify insider threats with unprecedented accuracy. Here's how Dtex work...

As a company that’s been fighting insider threat for 15 years, our investigations have uncovered commonalities in insider behavior regardless of industry or company size. Whether it’s a malicious insider or an external actor who has compromised an insider’s credentials, we tend to see insider ...